SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Project: Access Control Proposal
Purpose
This course project is intended to assess your ability to
comprehend and apply the basic concepts related to information
security management, such as the following:
The ability to discern when a risk assessment should be
performed and carrying out the task
Understanding user or customer access requirements, whether
remote or local
Using a layered security approach to establish and maintain
access controls
Working with other departments, such as the human resources
department, to identify and implement methods to prevent
unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks within these information
security domains and others will be evaluated against the
learning objectives as identified and described in previous
lessons of instruction for this course. Required Source
Information and Tools
Web References: Links to Web references in this Instructor
Guide and related materials are subject to change without prior
notice. These links were last verified on August 2, 2014.
The following tools and resources will be needed to complete
this project:
· Course textbook
· Access to the Internet
· Access to the library
· Text sheet: Integrated Distributors Incorporated
(access_project_ts_integrateddistributors)Learning Objectives
and Outcomes
Successful completion of this project will ensure that you are
capable of supporting the implementation and management of an
information systems security framework. To be able to do so,
you need to be able to do the following:
Relate how an access control policy framework is used to define
authorization and access to an information technology (IT)
infrastructure for compliance.
Mitigate risks to an IT infrastructure’s confidentiality, integrity,
and availability with sound access controls.
Relate how a data classification standard influences an IT
infrastructure’s access control requirements and
implementation.
Develop an access control policy framework consisting of best
practices for policies, standards, procedures, and guidelines to
mitigate unauthorized access.
Define proper security controls within the User Domain to
mitigate risks and threats caused by human nature and behavior.
Implement appropriate access controls for information systems
within IT infrastructures.
Mitigate risks from unauthorized access to IT systems through
proper testing and reporting.Project Checkpoints
The course project has a checkpoint strategy. Checkpoint
deliverables allow you to receive valuable feedback on your
interim work. In this project, you have four ungraded
checkpoint deliverables. (See the syllabus for the schedule.)
You may discuss project questions with the instructor, and you
should receive feedback from the instructor on previously
submitted work. The checkpoint deliverable ensures refinement
of the final deliverables, if incorporated effectively. The final
deliverable for this project is a professional report and a
PowerPoint presentation.
Checkpoint
Purpose of the Checkpoint
Expected Deliverables
1
· Understanding requirements
· Clarification on project deliverables
· Discussion on project concerns and progress up to this
checkpoint
· A review of the course project’s outline and schedule for
completion
Prepare an initial outline of issues and potential solutions and
discuss with your instructor, the chief information officer
(CIO).
2
· Clarification on project deliverables
· Discussion on project concerns and progress up to this
checkpoint
· A review of the course project’s outline and schedule for
completion
Prepare an extended outline of issues and potential solutions
and discuss with your instructor, the CIO.
3
· Clarification on project deliverables
· Discussion on project concerns and progress up to this
checkpoint
· A review of the course project’s outline and schedule for
completion
Draft the report and the PowerPoint presentation to discuss with
your instructor, the CIO.
4
· Clarification on project deliverables
· Discussion on project concerns and progress up to this
checkpoint
· A review of the course project’s outline and schedule for
completion
Modify the report and the PowerPoint presentation based on
feedback from your instructor, the
CIO.DeliverablesIntroduction
User identification, authentication, and authorization are
essential in developing, implementing, and maintaining a
framework for information system security. The basic function
of an information system security framework is to ensure the
confidentiality and the integrity, as well as the availability of
systems, applications, and data. Certain information security
implementation and management knowledge is required of
network administrators, IT service personnel, management, and
IT security practitioners, such as information security officers,
security analysts, and domain administrators. Scenario
You play the dual role of an IT architect and IT security
specialist working for Integrated Distributors Incorporated
(IDI), a multi-national organization with offices in several
countries. Your instructor for this course plays the role of the
chief information officer (CIO). Your peers play the role of
selected technology staff. Each of the organization’s locations
is operating with different information technologies and
infrastructure—IT systems, applications, and databases. Various
levels of IT security and access management have been
implemented and embedded within their respective
locations.Tasks
Your goals as the IT architect and IT security specialist are to:
Develop solutions to the issues that the specified location of IDI
is facing.
Develop plans to implement corporate-wide information access
methods to ensure confidentiality, integrity, and availability.
Assess risks and vulnerabilities with operating IT facilities in
the disparate locations where IDI now functions and develop
mitigation plans and implementation methods.
Analyze the strengths and weaknesses in the current systems of
IDI.
Address remote user and Web site user’s secure access
requirements.
Develop a proposed budget for the project—consider hardware,
software, upgrades/replacements, and consulting services.
Prepare detailed network and configuration diagrams outlining
the proposed change to be able to present it to the management.
Develop and submit a comprehensive report addressing the
learning objectives and your solutions to the issues within the
scenario.
Prepare a 10- to 15-slide PowerPoint presentation that addresses
important access control, infrastructure, and management
aspects from each location. Self-Assessment Checklist
I have considered an access control policy framework to define
authorization and access to an IT infrastructure for compliance
within the course project.
I have considered the influence of the data classification
standard in an IT infrastructure’s access control requirements
and implementation.
I have defined proper security controls within the User Domain
to mitigate risk and threats caused by human nature and
behavior.
I have developed and implemented an effective plan to mitigate
risks to an IT infrastructure’s confidentiality, integrity, and
availability with sound access controls.
I have developed an access control policy framework consisting
of best practices for policies, standards, procedures, and
guidelines to mitigate unauthorized access.
I have implemented appropriate access controls for information
systems within IT infrastructures.
I have followed the submission requirements and necessary
details for writing the report.
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1

Weitere ähnliche Inhalte

Ähnlich wie Project Access Control ProposalPurposeThis course project i

Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docxrtodd599
 
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxIT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxADDY50
 
Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineeringBhagyashriMore10
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxYaseenNazir3
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docxrtodd599
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Your goals as the IT architect and IT security specialist are to.docx
Your goals as the IT architect and IT security specialist are to.docxYour goals as the IT architect and IT security specialist are to.docx
Your goals as the IT architect and IT security specialist are to.docxdanhaley45372
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docxoswald1horne84988
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networksRaja Waseem Akhtar
 
Resume of md. ataul islam
Resume of md. ataul islamResume of md. ataul islam
Resume of md. ataul islamMd. Ataul Islam
 
Software Engineering Practices and Issues.pptx
Software Engineering Practices and Issues.pptxSoftware Engineering Practices and Issues.pptx
Software Engineering Practices and Issues.pptxNikilesh8
 
IT Application Development - with SDLC.pptx
IT Application Development - with SDLC.pptxIT Application Development - with SDLC.pptx
IT Application Development - with SDLC.pptxdjualaja88
 
Furqan ul karim_latest_cv
Furqan ul karim_latest_cvFurqan ul karim_latest_cv
Furqan ul karim_latest_cvFurqan Ul Karim
 
4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdfJose thomas
 
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxCIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxclarebernice
 
Project management IT Project Management
Project management IT Project Management Project management IT Project Management
Project management IT Project Management Amanda Haddad
 

Ähnlich wie Project Access Control ProposalPurposeThis course project i (20)

Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
 
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxIT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
 
Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineering
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Object oriented analysis and design unit- i
Object oriented analysis and design unit- iObject oriented analysis and design unit- i
Object oriented analysis and design unit- i
 
Your goals as the IT architect and IT security specialist are to.docx
Your goals as the IT architect and IT security specialist are to.docxYour goals as the IT architect and IT security specialist are to.docx
Your goals as the IT architect and IT security specialist are to.docx
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Resume of md. ataul islam
Resume of md. ataul islamResume of md. ataul islam
Resume of md. ataul islam
 
Solution Design Services An Overview
Solution Design Services  An OverviewSolution Design Services  An Overview
Solution Design Services An Overview
 
Software Engineering Practices and Issues.pptx
Software Engineering Practices and Issues.pptxSoftware Engineering Practices and Issues.pptx
Software Engineering Practices and Issues.pptx
 
CV - Gunjan Sharma
CV - Gunjan SharmaCV - Gunjan Sharma
CV - Gunjan Sharma
 
IT Application Development - with SDLC.pptx
IT Application Development - with SDLC.pptxIT Application Development - with SDLC.pptx
IT Application Development - with SDLC.pptx
 
Furqan ul karim_latest_cv
Furqan ul karim_latest_cvFurqan ul karim_latest_cv
Furqan ul karim_latest_cv
 
4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf
 
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxCIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
 
Project management IT Project Management
Project management IT Project Management Project management IT Project Management
Project management IT Project Management
 

Mehr von davieec5f

Week 1 AssignmentHealth Information System Topic SelectionReview.docx
Week 1 AssignmentHealth Information System Topic SelectionReview.docxWeek 1 AssignmentHealth Information System Topic SelectionReview.docx
Week 1 AssignmentHealth Information System Topic SelectionReview.docxdavieec5f
 
week 1 and week 2 WEEK 1Your manager has tasked you to create .docx
week 1 and week 2 WEEK 1Your manager has tasked you to create .docxweek 1 and week 2 WEEK 1Your manager has tasked you to create .docx
week 1 and week 2 WEEK 1Your manager has tasked you to create .docxdavieec5f
 
Week 1 - AssignmentDecision MakingReview the organizationa.docx
Week 1 - AssignmentDecision MakingReview the organizationa.docxWeek 1 - AssignmentDecision MakingReview the organizationa.docx
Week 1 - AssignmentDecision MakingReview the organizationa.docxdavieec5f
 
Week 1 - Readings Response Essay - Discussion3232 unread repli.docx
Week 1 - Readings Response Essay - Discussion3232 unread repli.docxWeek 1 - Readings Response Essay - Discussion3232 unread repli.docx
Week 1 - Readings Response Essay - Discussion3232 unread repli.docxdavieec5f
 
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxWeb 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxdavieec5f
 
We will need about 530 words a piece. Issue 56 on the JC Website tit.docx
We will need about 530 words a piece. Issue 56 on the JC Website tit.docxWe will need about 530 words a piece. Issue 56 on the JC Website tit.docx
We will need about 530 words a piece. Issue 56 on the JC Website tit.docxdavieec5f
 
We often imagine our cities as places where people from differing cu.docx
We often imagine our cities as places where people from differing cu.docxWe often imagine our cities as places where people from differing cu.docx
We often imagine our cities as places where people from differing cu.docxdavieec5f
 
We learned how virtual teams are becoming more prevalent in organiza.docx
We learned how virtual teams are becoming more prevalent in organiza.docxWe learned how virtual teams are becoming more prevalent in organiza.docx
We learned how virtual teams are becoming more prevalent in organiza.docxdavieec5f
 
Watch video under web links Life After Suicide. and the vignette.docx
Watch video under web links Life After Suicide. and the vignette.docxWatch video under web links Life After Suicide. and the vignette.docx
Watch video under web links Life After Suicide. and the vignette.docxdavieec5f
 
We have two readings on immigration, ch. 9 and the chapters from Kos.docx
We have two readings on immigration, ch. 9 and the chapters from Kos.docxWe have two readings on immigration, ch. 9 and the chapters from Kos.docx
We have two readings on immigration, ch. 9 and the chapters from Kos.docxdavieec5f
 
Watching the video please write a short reaction paper (1-2 page.docx
Watching the video please write a short reaction paper (1-2 page.docxWatching the video please write a short reaction paper (1-2 page.docx
Watching the video please write a short reaction paper (1-2 page.docxdavieec5f
 
We have studied a wide variety of societies, cultures, etc. during.docx
We have studied a wide variety of societies, cultures, etc. during.docxWe have studied a wide variety of societies, cultures, etc. during.docx
We have studied a wide variety of societies, cultures, etc. during.docxdavieec5f
 
We have had failed attempts at a family viewing hour and the seven w.docx
We have had failed attempts at a family viewing hour and the seven w.docxWe have had failed attempts at a family viewing hour and the seven w.docx
We have had failed attempts at a family viewing hour and the seven w.docxdavieec5f
 
We have covered different modes of transportation in class. Think ab.docx
We have covered different modes of transportation in class. Think ab.docxWe have covered different modes of transportation in class. Think ab.docx
We have covered different modes of transportation in class. Think ab.docxdavieec5f
 
We had to make a presentation on expnasion of celbi- pulp and paper .docx
We had to make a presentation on expnasion of celbi- pulp and paper .docxWe had to make a presentation on expnasion of celbi- pulp and paper .docx
We had to make a presentation on expnasion of celbi- pulp and paper .docxdavieec5f
 
Watch World is Flat video by Thomas Freedman (for first 40 minutes.docx
Watch World is Flat video by Thomas Freedman (for first 40 minutes.docxWatch World is Flat video by Thomas Freedman (for first 40 minutes.docx
Watch World is Flat video by Thomas Freedman (for first 40 minutes.docxdavieec5f
 
Watch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docx
Watch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docxWatch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docx
Watch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docxdavieec5f
 
Watch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docx
Watch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docxWatch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docx
Watch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docxdavieec5f
 
Watch The quiet american movie and answer 4 questions Questions.docx
Watch The quiet american movie and answer 4 questions Questions.docxWatch The quiet american movie and answer 4 questions Questions.docx
Watch The quiet american movie and answer 4 questions Questions.docxdavieec5f
 
watched the flim ( Anvil ! The story of Anvil)then have the follow.docx
watched the flim ( Anvil ! The story of Anvil)then have the follow.docxwatched the flim ( Anvil ! The story of Anvil)then have the follow.docx
watched the flim ( Anvil ! The story of Anvil)then have the follow.docxdavieec5f
 

Mehr von davieec5f (20)

Week 1 AssignmentHealth Information System Topic SelectionReview.docx
Week 1 AssignmentHealth Information System Topic SelectionReview.docxWeek 1 AssignmentHealth Information System Topic SelectionReview.docx
Week 1 AssignmentHealth Information System Topic SelectionReview.docx
 
week 1 and week 2 WEEK 1Your manager has tasked you to create .docx
week 1 and week 2 WEEK 1Your manager has tasked you to create .docxweek 1 and week 2 WEEK 1Your manager has tasked you to create .docx
week 1 and week 2 WEEK 1Your manager has tasked you to create .docx
 
Week 1 - AssignmentDecision MakingReview the organizationa.docx
Week 1 - AssignmentDecision MakingReview the organizationa.docxWeek 1 - AssignmentDecision MakingReview the organizationa.docx
Week 1 - AssignmentDecision MakingReview the organizationa.docx
 
Week 1 - Readings Response Essay - Discussion3232 unread repli.docx
Week 1 - Readings Response Essay - Discussion3232 unread repli.docxWeek 1 - Readings Response Essay - Discussion3232 unread repli.docx
Week 1 - Readings Response Essay - Discussion3232 unread repli.docx
 
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxWeb 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
 
We will need about 530 words a piece. Issue 56 on the JC Website tit.docx
We will need about 530 words a piece. Issue 56 on the JC Website tit.docxWe will need about 530 words a piece. Issue 56 on the JC Website tit.docx
We will need about 530 words a piece. Issue 56 on the JC Website tit.docx
 
We often imagine our cities as places where people from differing cu.docx
We often imagine our cities as places where people from differing cu.docxWe often imagine our cities as places where people from differing cu.docx
We often imagine our cities as places where people from differing cu.docx
 
We learned how virtual teams are becoming more prevalent in organiza.docx
We learned how virtual teams are becoming more prevalent in organiza.docxWe learned how virtual teams are becoming more prevalent in organiza.docx
We learned how virtual teams are becoming more prevalent in organiza.docx
 
Watch video under web links Life After Suicide. and the vignette.docx
Watch video under web links Life After Suicide. and the vignette.docxWatch video under web links Life After Suicide. and the vignette.docx
Watch video under web links Life After Suicide. and the vignette.docx
 
We have two readings on immigration, ch. 9 and the chapters from Kos.docx
We have two readings on immigration, ch. 9 and the chapters from Kos.docxWe have two readings on immigration, ch. 9 and the chapters from Kos.docx
We have two readings on immigration, ch. 9 and the chapters from Kos.docx
 
Watching the video please write a short reaction paper (1-2 page.docx
Watching the video please write a short reaction paper (1-2 page.docxWatching the video please write a short reaction paper (1-2 page.docx
Watching the video please write a short reaction paper (1-2 page.docx
 
We have studied a wide variety of societies, cultures, etc. during.docx
We have studied a wide variety of societies, cultures, etc. during.docxWe have studied a wide variety of societies, cultures, etc. during.docx
We have studied a wide variety of societies, cultures, etc. during.docx
 
We have had failed attempts at a family viewing hour and the seven w.docx
We have had failed attempts at a family viewing hour and the seven w.docxWe have had failed attempts at a family viewing hour and the seven w.docx
We have had failed attempts at a family viewing hour and the seven w.docx
 
We have covered different modes of transportation in class. Think ab.docx
We have covered different modes of transportation in class. Think ab.docxWe have covered different modes of transportation in class. Think ab.docx
We have covered different modes of transportation in class. Think ab.docx
 
We had to make a presentation on expnasion of celbi- pulp and paper .docx
We had to make a presentation on expnasion of celbi- pulp and paper .docxWe had to make a presentation on expnasion of celbi- pulp and paper .docx
We had to make a presentation on expnasion of celbi- pulp and paper .docx
 
Watch World is Flat video by Thomas Freedman (for first 40 minutes.docx
Watch World is Flat video by Thomas Freedman (for first 40 minutes.docxWatch World is Flat video by Thomas Freedman (for first 40 minutes.docx
Watch World is Flat video by Thomas Freedman (for first 40 minutes.docx
 
Watch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docx
Watch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docxWatch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docx
Watch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docx
 
Watch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docx
Watch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docxWatch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docx
Watch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docx
 
Watch The quiet american movie and answer 4 questions Questions.docx
Watch The quiet american movie and answer 4 questions Questions.docxWatch The quiet american movie and answer 4 questions Questions.docx
Watch The quiet american movie and answer 4 questions Questions.docx
 
watched the flim ( Anvil ! The story of Anvil)then have the follow.docx
watched the flim ( Anvil ! The story of Anvil)then have the follow.docxwatched the flim ( Anvil ! The story of Anvil)then have the follow.docx
watched the flim ( Anvil ! The story of Anvil)then have the follow.docx
 

Kürzlich hochgeladen

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 

Kürzlich hochgeladen (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 

Project Access Control ProposalPurposeThis course project i

  • 1. Project: Access Control Proposal Purpose This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following: The ability to discern when a risk assessment should be performed and carrying out the task Understanding user or customer access requirements, whether remote or local Using a layered security approach to establish and maintain access controls Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course. Required Source Information and Tools Web References: Links to Web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on August 2, 2014. The following tools and resources will be needed to complete this project: · Course textbook · Access to the Internet · Access to the library · Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors)Learning Objectives and Outcomes Successful completion of this project will ensure that you are capable of supporting the implementation and management of an
  • 2. information systems security framework. To be able to do so, you need to be able to do the following: Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance. Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation. Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access. Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior. Implement appropriate access controls for information systems within IT infrastructures. Mitigate risks from unauthorized access to IT systems through proper testing and reporting.Project Checkpoints The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presentation. Checkpoint Purpose of the Checkpoint Expected Deliverables 1 · Understanding requirements · Clarification on project deliverables · Discussion on project concerns and progress up to this
  • 3. checkpoint · A review of the course project’s outline and schedule for completion Prepare an initial outline of issues and potential solutions and discuss with your instructor, the chief information officer (CIO). 2 · Clarification on project deliverables · Discussion on project concerns and progress up to this checkpoint · A review of the course project’s outline and schedule for completion Prepare an extended outline of issues and potential solutions and discuss with your instructor, the CIO. 3 · Clarification on project deliverables · Discussion on project concerns and progress up to this checkpoint · A review of the course project’s outline and schedule for completion Draft the report and the PowerPoint presentation to discuss with your instructor, the CIO. 4 · Clarification on project deliverables · Discussion on project concerns and progress up to this checkpoint · A review of the course project’s outline and schedule for completion Modify the report and the PowerPoint presentation based on feedback from your instructor, the CIO.DeliverablesIntroduction User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of
  • 4. systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators. Scenario You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.Tasks Your goals as the IT architect and IT security specialist are to: Develop solutions to the issues that the specified location of IDI is facing. Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability. Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods. Analyze the strengths and weaknesses in the current systems of IDI. Address remote user and Web site user’s secure access requirements. Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services. Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management. Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario. Prepare a 10- to 15-slide PowerPoint presentation that addresses
  • 5. important access control, infrastructure, and management aspects from each location. Self-Assessment Checklist I have considered an access control policy framework to define authorization and access to an IT infrastructure for compliance within the course project. I have considered the influence of the data classification standard in an IT infrastructure’s access control requirements and implementation. I have defined proper security controls within the User Domain to mitigate risk and threats caused by human nature and behavior. I have developed and implemented an effective plan to mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. I have developed an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access. I have implemented appropriate access controls for information systems within IT infrastructures. I have followed the submission requirements and necessary details for writing the report. © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1